Skip to main content

Research Repository

Advanced Search

All Outputs (28)

A secure routing approach based on league championship algorithm for wireless body sensor networks in healthcare (2023)
Journal Article
Hosseinzadeh, M., Mohammed, A. H., Rahmani, A. M., A Alenizi, F., Zandavi, S. M., Yousefpoor, E., …Tightiz, L. (2023). A secure routing approach based on league championship algorithm for wireless body sensor networks in healthcare. PLoS ONE, 18(10), Article e0290119. https://doi.org/10.1371/journal.pone.0290119

Patients must always communicate with their doctor for checking their health status. In recent years, wireless body sensor networks (WBSNs) has an important contribution in Healthcare. In these applications, energy-efficient and secure routing is rea... Read More about A secure routing approach based on league championship algorithm for wireless body sensor networks in healthcare.

A novel fuzzy trust-based secure routing scheme in flying ad hoc networks (2023)
Journal Article
Hosseinzadeh, M., Mohammed, A. H., Alenizi, F. A., Malik, M. H., Yousefpoor, E., Yousefpoor, M. S., …Tightiz, L. (2023). A novel fuzzy trust-based secure routing scheme in flying ad hoc networks. Vehicular Communications, 44, Article 100665. https://doi.org/10.1016/j.vehcom.2023.100665

Today, many studies assess vulnerabilities, threats, and attacks in flying ad hoc networks (FANETs) to provide solutions for countermeasures. Protecting FANETs against attackers and coordinating connections are challenging. The purpose of this study... Read More about A novel fuzzy trust-based secure routing scheme in flying ad hoc networks.

Task scheduling mechanisms for fog computing: A systematic survey (2023)
Journal Article
Hosseinzadeh, M., Azhir, E., Lansky, J., Mildeova, S., Ahmed, O. H., Malik, M. H., & Khan, F. (2023). Task scheduling mechanisms for fog computing: A systematic survey. IEEE Access, 11, 50994-51017. https://doi.org/10.1109/ACCESS.2023.3277826

In the Internet of Things (IoT) ecosystem, some processing is done near data production sites at higher speeds without the need for high bandwidth by combining Fog Computing (FC) and cloud computing. Fog computing offers advantages for real-time syst... Read More about Task scheduling mechanisms for fog computing: A systematic survey.

Self-adapting security monitoring in Eucalyptus cloud environment (2023)
Journal Article
Mahmood, S., Yahaya, A., Hasan, R., Hussain, S., Malik, M. H., & Kamal Sarker, U. (2023). Self-adapting security monitoring in Eucalyptus cloud environment. International Journal of Advanced Computer Science and Applications, 14(3), 80-93. https://doi.org/10.14569/IJACSA.2023.0140310

This paper discusses the importance of virtual machine (VM) scheduling strategies in cloud computing environments for handling the increasing number of tasks due to virtualization and cloud computing technology adoption. The paper evaluates legacy me... Read More about Self-adapting security monitoring in Eucalyptus cloud environment.

Toward designing a secure authentication protocol for IoT environments (2023)
Journal Article
Hosseinzadeh, M., Malik, M. H., Safkhani, M., Bagheri, N., Le, Q. H., Tightiz, L., & Mosavi, A. H. (2023). Toward designing a secure authentication protocol for IoT environments. Sustainability, 15(7), 5934. https://doi.org/10.3390/su15075934

Authentication protocol is a critical part of any application to manage the access control in many applications. A former research recently proposed a lightweight authentication scheme to transmit data in an IoT subsystem securely. Although the desig... Read More about Toward designing a secure authentication protocol for IoT environments.

Inventory management optimization with data analytics for a trading company (2023)
Journal Article
Khan, S. O., Hasan, R., Hussain, S., Malik, M. H., & Mahmood, S. (2023). Inventory management optimization with data analytics for a trading company. Journal of Big Data & Smart City,

Distributors, manufacturers, and suppliers face the daunting challenge of inventory control. Each supply management problem that arises has ramifications. To satisfy supply and demand, inventory optimization will ensure that the correct commodity is... Read More about Inventory management optimization with data analytics for a trading company.

An energy-aware routing method using firefly algorithm for flying ad hoc networks (2023)
Journal Article
Lansky, J., Rahmani, A. M., Malik, M. H., Yousefpoor, E., Yousefpoor, M. S., Khan, M. U., & Hosseinzadeh, M. (2023). An energy-aware routing method using firefly algorithm for flying ad hoc networks. Scientific Reports, 13(1), Article 1323. https://doi.org/10.1038/s41598-023-27567-7

Flying ad-hoc networks (FANETs) include a large number of drones, which communicate with each other based on an ad hoc model. These networks provide new opportunities for various applications such as military, industrial, and civilian applications. H... Read More about An energy-aware routing method using firefly algorithm for flying ad hoc networks.

Cryptanalysis of two recent ultra-lightweight authentication protocols (2022)
Journal Article
Servati, M. R., Safkhani, M., Ali, S., Malik, M. H., Ahmed, O. H., Hosseinzadeh, M., & Mosavi, A. H. (2022). Cryptanalysis of two recent ultra-lightweight authentication protocols. Mathematics, 10(23), 4611. https://doi.org/10.3390/math10234611

Radio Frequency Identification (RFID) technology is a critical part of many Internet of Things (IoT) systems, including Medical IoT (MIoT) for instance. On the other hand, the IoT devices’ numerous limitations (such as memory space, computing capabil... Read More about Cryptanalysis of two recent ultra-lightweight authentication protocols.

Development of a lightweight centralized authentication mechanism for the internet of things driven by fog (2022)
Journal Article
Lansky, J., Sadrishojaei, M., Rahmani, A. M., Malik, M. H., Kazemian, F., & Hosseinzadeh, M. (2022). Development of a lightweight centralized authentication mechanism for the internet of things driven by fog. Mathematics, 10(22), 4166. https://doi.org/10.3390/math10224166

The rapid development of technology has made the Internet of Things an integral element of modern society. Modern Internet of Things’ implementations often use Fog computing, an offshoot of the Cloud computing that offers localized processing power a... Read More about Development of a lightweight centralized authentication mechanism for the internet of things driven by fog.

SecAODV: A Secure healthcare routing scheme based on hybrid cryptography in wireless body sensor networks (2022)
Journal Article
Jeong, H., Lee, S., Hussain Malik, M., Yousefpoor, E., Yousefpoor, M. S., Ahmed, O. H., …Mosavi, A. (2022). SecAODV: A Secure healthcare routing scheme based on hybrid cryptography in wireless body sensor networks. Frontiers in Medicine, 9, Article 829055. https://doi.org/10.3389/fmed.2022.829055

In recent decades, the use of sensors has dramatically grown to monitor human body activities and maintain the health status. In this application, routing and secure data transmission are very important to prevent the unauthorized access by attackers... Read More about SecAODV: A Secure healthcare routing scheme based on hybrid cryptography in wireless body sensor networks.

An energy-aware and Q-learning-based area coverage for oil pipeline monitoring systems using sensors and Internet of Things (2022)
Journal Article
Rahmani, A. M., Ali, S., Malik, M. H., Yousefpoor, E., Yousefpoor, M. S., Mousavi, A., …Hosseinzadeh, M. (2022). An energy-aware and Q-learning-based area coverage for oil pipeline monitoring systems using sensors and Internet of Things. Scientific Reports, 12(1), https://doi.org/10.1038/s41598-022-12181-w

Pipelines are the safest tools for transporting oil and gas. However, the environmental effects and sabotage of hostile people cause corrosion and decay of pipelines, which bring financial and environmental damages. Today, new technologies such as th... Read More about An energy-aware and Q-learning-based area coverage for oil pipeline monitoring systems using sensors and Internet of Things.

E-learning development based on internet of things and blockchain technology during Covid-19 Pandemic (2021)
Journal Article
Rahmani, A. M., Naqvi, R., Malik, M., Malik, T. S., Sadrishojaei, M., Hosseinzadeh, M., & Al-Musawi, A. (2021). E-learning development based on internet of things and blockchain technology during Covid-19 Pandemic. Mathematics, 9(24), 3151. https://doi.org/10.3390/math9243151

The suspension of institutions around the world in early 2020 due to the COVID-19 virus did not stop the learning process. E-learning concepts and digital technologies enable students to learn from a safe distance while continuing their educational p... Read More about E-learning development based on internet of things and blockchain technology during Covid-19 Pandemic.

Context-aware multi-user offloading in mobile edge computing: A federated learning-based approach (2021)
Journal Article
Shahidinejad, A., Farahbakhsh, F., Ghobaei-Arani, M., Malik, M. H., & Anwar, T. (2021). Context-aware multi-user offloading in mobile edge computing: A federated learning-based approach. Journal of Grid Computing, 19(2), https://doi.org/10.1007/s10723-021-09559-x

Mobile edge computing (MEC) provides an effective solution to help the Internet of Things (IoT) devices with delay-sensitive and computation-intensive tasks by offering computing capabilities in the proximity of mobile device users. Most of the exist... Read More about Context-aware multi-user offloading in mobile edge computing: A federated learning-based approach.

COVID-19 and learning styles: GCET as case study (2021)
Journal Article
Malik, M. H., Amjed, S., & Hasani, S. (2021). COVID-19 and learning styles: GCET as case study. Computers, Materials & Continua, 68(1), 103-115. https://doi.org/10.32604/cmc.2021.014562

The COVID-19 pandemic has caused higher educational institutions around the world to close campus-based activities and move to online delivery. The aim of this paper is to present the case of Global College of Engineering and Technology (GCET) and ho... Read More about COVID-19 and learning styles: GCET as case study.

IPv6 cryptographically generated address: Analysis, optimization and protection (2021)
Journal Article
Ahmed, A. S., Hassan, R., Qamar, F., & Malik, M. (2021). IPv6 cryptographically generated address: Analysis, optimization and protection. Computers, Materials & Continua, 68(1), 247-265. https://doi.org/10.32604/cmc.2021.014233

In networking, one major difficulty that nodes suffer from is the need for their addresses to be generated and verified without relying on a third party or public authorized servers. To resolve this issue, the use of selfcertifying addresses have bec... Read More about IPv6 cryptographically generated address: Analysis, optimization and protection.

Max-gain relay selection scheme for wireless networks (2020)
Journal Article
Ullah, S., Malik, M. H., Tuysuz, M. F., Hasnain, M., & Aydin, M. E. (2021). Max-gain relay selection scheme for wireless networks. International Journal of Engineering Science and Technology, 24(1), 183-191. https://doi.org/10.1016/j.jestch.2020.08.009

© 2020 Karabuk University Next generation wireless systems are supposed to handle high amount of data with broader coverage and high quality of service (QoS). When a signal travels from a source to destination, the signal quality may suffer from the... Read More about Max-gain relay selection scheme for wireless networks.

Formal verification of a hybrid machine learning-based fault prediction model in Internet of Things applications (2020)
Journal Article
Souri, A., Mohammed, A. S., Yousif Potrus, M., Malik, M. H., Safara, F., & Hosseinzadeh, M. (2020). Formal verification of a hybrid machine learning-based fault prediction model in Internet of Things applications. IEEE Access, 8, 23863-23874. https://doi.org/10.1109/ACCESS.2020.2967629

By increasing the complexity of the Internet of Things (IoT) applications, fault prediction become an important challenge in interactions between human, and smart devices. Fault prediction is one of the key factors to achieve better arranging the IoT... Read More about Formal verification of a hybrid machine learning-based fault prediction model in Internet of Things applications.

Network Resiliency and big data applications (2016)
Journal Article
Sattar, K., Salman, M., Malik, M. H., & Khan, H. (2016). Network Resiliency and big data applications. Communications and Network, 14(11), 222-225

Today we are living in the digital world. There is a vast amount of data everywhere and it is increasing every day. Big data is simply large amount of data. The network is used to transfer data from one place to another. But when we are talking about... Read More about Network Resiliency and big data applications.

Architecture for grid computing (2016)
Journal Article
Hasnain, M., Malik, M. H., Raoof, A., Ullah, S., & Dad Javed, A. (2016). Architecture for grid computing. Communications and Network, 14(11), 84-90

Grid computing is a technology about the sharing of distributed resources and integration system at a large scale. Grid computing is the mainstream technology for the resource sharing and system at the large-scale. Grid computing is specially made fo... Read More about Architecture for grid computing.

Congestion control in wireless sensor network (2016)
Journal Article
Malik, M. H., Raza, S., Akram, K., Rehman, A., Khan, J., & Rafi, M. A. (2016). Congestion control in wireless sensor network. Communications and Network, 14(10),

Wireless sensor network also known as (WSN) is a broad research area with a lot of issues and challenges. With the passage of time, a lot of issues have been resolved, but there are still many awaiting. In WSN, there are different nodes connected to... Read More about Congestion control in wireless sensor network.